Skip to main content

The Malware Museum

Mikko Hypponen

The Malware Museum is a collection of malware programs, usually viruses, that were distributed in the 1980s and 1990s on home computers. Once they infected a system, they would sometimes show animation or messages that you had been infected.



rss RSS

Show sorted alphabetically
Show sorted alphabetically
SHOW DETAILS
up-solid down-solid
eye
Title
Date Archived
Creator
The Malware Museum
software
eye 57,133
favorite 11
comment 3
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
The Malware Museum
software
eye 45,401
favorite 4
comment 5
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 5 reviews )
The Malware Museum
software
eye 41,968
favorite 18
comment 6
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 6 reviews )
The Malware Museum
software
eye 46,390
favorite 5
comment 3
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 3 reviews )
The Malware Museum
software
eye 28,716
favorite 9
comment 5
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 5 reviews )
The Malware Museum
software
eye 20,172
favorite 3
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
The Malware Museum
software
eye 54,701
favorite 15
comment 3
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
The Malware Museum
software
eye 16,645
favorite 3
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 2 reviews )
The Malware Museum
software
eye 14,794
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
software
eye 9,910
favorite 2
comment 3
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
The Malware Museum
software
eye 11,054
favorite 0
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
The Malware Museum
software
eye 21,879
favorite 3
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
( 1 reviews )
The Malware Museum
software
eye 33,517
favorite 6
comment 4
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 4 reviews )
The Malware Museum
software
eye 17,856
favorite 3
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
The Malware Museum
software
eye 15,245
favorite 3
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
software
eye 12,336
favorite 0
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
The Malware Museum
software
eye 9,588
favorite 2
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
The Malware Museum
software
eye 4,071
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
( 1 reviews )
The Malware Museum
software
eye 7,141
favorite 4
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
software
eye 10,350
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
by Mikko Hypponen
movies
eye 19,686
favorite 18
comment 0
Presented at DEF CON 19 in Las Vegas, Nevada in 2011. "It's 2011, so this year it's going to be 25 years since Brain.A, the first PC virus, Join Mikko Hypponen as he talks about the history and evolution of computer viruses. From Brain to Stuxnet, he's spent his career tracking malware and will give a pretty good rundown on what has happened, when and why it mattered. Mikko Hypponen is based in Helsinki, Finland. He has been analysing computer viruses for more than 20 years. He has written...
The Malware Museum
software
eye 3,241
favorite 1
comment 0
Malware Example: PPSCARE.COM *PPSCARE.COM - upon invocation, PingPongScare (tm) will become resident and clutter the screen with the characteristic "bouncing ball" of the PingPong boot block infector. Computing can continue while PingPongScare is in effect.
The Malware Museum
software
eye 5,469
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
software
eye 13,205
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
software
eye 5,110
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
software
eye 12,474
favorite 1
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
software
eye 4,102
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
software
eye 7,413
favorite 2
comment 3
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
The Malware Museum
by Daniel White
movies
eye 6,415
favorite 3
comment 2
A quick presentation on Virus History by Daniel White at Project Cyber Virus, held on May 5th, 2015 at Swissnex San Francisco. In 2004, Daniel White’s computer was infected with the Sasser worm, a fast-spreading autonomous worm that made millions of computers around the world reboot continuously. Fascinated by the concept of malware, he spent the following years learning everything he could about the subject, from general malware news to specific details of every virus, becoming a self-taught...
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
Topics: Virus, History, Malware
The Malware Museum
software
eye 6,870
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
software
eye 9,574
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
software
eye 2,549
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
The Malware Museum
software
eye 10,921
favorite 2
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavorite ( 1 reviews )
The Malware Museum
software
eye 6,147
favorite 3
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
The Malware Museum
software
eye 3,900
favorite 1
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
software
eye 6,722
favorite 2
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
software
eye 6,124
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
software
eye 7,865
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
software
eye 2,996
favorite 2
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
software
eye 4,479
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavorite ( 1 reviews )
The Malware Museum
software
eye 3,466
favorite 1
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
software
eye 2,766
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
software
eye 2,912
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
software
eye 2,756
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
software
eye 1,951
favorite 0
comment 0
Malware Example: CASCARE.COM *CASCARE.COM - upon invocation, CascadeScare (tm) will become resident. After a brief pause, the characteristic rat-a-tat sound of the Cascade virus and its nifty falling letters effect will be seen. This will continue intermittently, for as long as CascadeScare is resident. If the computer is in graphics mode, only the rat-a-tat sound effect will be noticed.
The Malware Museum
software
eye 3,233
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
software
eye 17,264
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
software
eye 11,964
favorite 1
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
software
eye 2,323
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
The Malware Museum
software
eye 2,565
favorite 2
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
software
eye 2,554
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
software
eye 5,819
favorite 1
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
The Malware Museum
software
eye 2,734
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
software
eye 4,185
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
( 1 reviews )
The Malware Museum
software
eye 2,532
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
software
eye 2,659
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
software
eye 2,118
favorite 0
comment 0
Malware Example: JERSCARE.COM *JERSCARE.COM - upon invocation, JerusalemScare (tm) becomes resident. After a short period of time - about a minute on most systems - Jerusa- lemScare will effect the characteristic Jerusalem virus system slowdown and scrolling black window effect on the left side of the monitor.
The Malware Museum
software
eye 4,092
favorite 1
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
software
eye 3,500
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
software
eye 3,147
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
The Malware Museum
software
eye 2,578
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
software
eye 2,552
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
by Mikko Hyppönen
texts
eye 1,609
favorite 3
comment 0
This paper categorizes different types of virus activation routines which are found in existing viruses and also discusses what triggers these activation routines. Common viruses are used as examples where possible. This paper also covers why it is important to know what a virus exactly does if you are infected by one. Some horror stories of the worst possible activation routine in a virus are also included. The scope of this paper is limited to PC compatible machines.
Topics: virus, viruses, activation, routines, routine, antivirus, user, mosaic, hard, machine, activation...
The Malware Museum
software
eye 3,268
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
software
eye 2,565
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
software
eye 3,127
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
software
eye 2,521
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
The Malware Museum
software
eye 4,415
favorite 3
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
software
eye 15,786
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
by Mikko Hyppönen
texts
eye 1,052
favorite 2
comment 0
This paper will discuss methods viruses use or might use in the future to attack anti-virus programs. Attacks of this kind are becoming more common, as virus writers seem to be constantly looking for ways to make their viruses more efficient and vigorous. This paper also suggests how to make antivirus products more resistant against such attacks. The scope of this paper is limited to PC compatible machines
Topics: virus, program, viruses, attack, vims, scanner, programs, code, retrovirus, resident, virus...
The Malware Museum
software
eye 2,408
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
The Malware Museum
software
eye 2,672
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
software
eye 3,003
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
software
eye 2,545
favorite 2
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
software
eye 3,060
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.